An Improved Certificateless Authenticated Key Agreement Protocol

被引:0
|
作者
Yang, Haomin [1 ]
Zhang, Yaoxue [1 ]
Zhou, Yuezhi [1 ]
机构
[1] Tsinghua Univ, Dept Comp Sci & Technol, Beijing 100084, Peoples R China
关键词
certificateless public key cryptography; key agreement; man-in-the-middle attack; bilinear pairing; CRYPTOGRAPHY;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Recently, Mokhtarnameh, Ho, Muthuvelu proposed a certificateless key agreement protocol. In this paper, we show that their protocol is unsecured against a man-in-the-middle attack. In addition, the authors claimed that their scheme provides a binding long-term public key with a corresponding partial private key. In fact, their protocol does not achieve the binding. We propose an improved key agreement protocol based on the protocol proposed by Mokhtarnameh et al. The improved protocol can resist the man-in-the-middle attack as well as satisfy the desired security properties for key agreement. It truly achieves the one-to-one correspondence between the long-term public key and the partial private key of a user. Compared with the other related protocols, the protocol has advantages in both security and computational efficiency.
引用
收藏
页码:26 / 30
页数:5
相关论文
共 50 条
  • [31] Two-party certificateless authenticated key agreement protocol with enhanced security
    Tao W.
    Xiaojun J.
    Journal of China Universities of Posts and Telecommunications, 2019, 26 (01): : 12 - 20
  • [32] A Two-Party Certificateless Authenticated Key Agreement Protocol without Pairing
    Hou, Mengbo
    Xu, Qiuliang
    2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 1, 2009, : 412 - 416
  • [33] Two-party certificateless authenticated key agreement protocol with enhanced security
    Wu Tao
    Jing Xiaojun
    The Journal of China Universities of Posts and Telecommunications, 2019, 26 (01) : 12 - 20
  • [34] ATwo-party Certificateless Authenticated Key Agreement Protocol with provable security
    Li Gui-ying
    Hou Meng-bo
    Zhao Chuan
    Xu Qiu-liang
    2013 9TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2013, : 559 - 563
  • [35] Secure and Efficient Two-Party Certificateless Authenticated Key Agreement Protocol
    Hou, Mengbo
    Xu, Qiuliang
    2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL III, 2009, : 308 - 311
  • [36] A certificateless group authenticated key agreement protocol based on dynamic binary tree
    Sun, Yang
    Yin, Shoulin
    Liu, Jie
    Teng, Lin
    International Journal of Network Security, 2019, 21 (05): : 843 - 849
  • [37] Improved authenticated multiple-key agreement protocol
    Yeh, HT
    Sun, HM
    Hwang, T
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2003, 46 (2-3) : 207 - 211
  • [38] An improved Popescu's authenticated key agreement protocol
    Yoon, EJ
    Yoo, KY
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 5, 2006, 3984 : 276 - 283
  • [39] Improved authenticated multiple-key agreement protocol
    Yen, SM
    Joye, M
    ELECTRONICS LETTERS, 1998, 34 (18) : 1738 - 1739
  • [40] Improved Authenticated Multi-Key Agreement Protocol
    ZHANG Hua
    Wuhan University Journal of Natural Sciences, 2006, (06) : 1915 - 1918